Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CWE-506

CWE-506 Embedded Malicious Code

Идентификаторы ФСТЭК уязвимостей

Идентификатор, базы данных общеизвестных уязвимостей информационной безопасности
Идентификатор Описание
BDU:2018-00474 Уязвимость чипсета Promontory, используемого совместно с процессорами Ryzen и Ryzen Pro, связанная с наличием недекларированных возможностей в его микропрограммном обеспечении и позволяющая получить доступ к физической памяти
BDU:2018-00475 Уязвимость чипсета Promontory, используемого совместно с процессорами Ryzen и Ryzen Pro, связанная с наличием недекларированных возможностей микросхемы ASIC, входящей в состав чипсета Promontory, и позволяющая получить доступ к физической памяти
BDU:2022-04122 Уязвимость реализации интерфейса REST API плагина для управления школой и ее объектами School Management Pro системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный PHP-код и получить полный контроль над приложени...
BDU:2023-02044 Уязвимость программного обеспечения обмена сообщениями и видеоконференции 3CX Electron Desktop App для операционных систем Windows и macOS, позволяющая нарушителю выполнить произвольный код
BDU:2024-02406 Уязвимость библиотеки liblzma пакета для сжатия данных XZ Utils, позволяющая нарушителю выполнить произвольный код
BDU:2024-10935 Уязвимость функции addToQueue() пакета разработки для блокчейн-платформы Solana web3.js, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2025-03223 Уязвимость компонента reviewdog/action-setup платформы для совместной разработки GitHub, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2025-12664 Уязвимость пакетов node-api, node-bindings, duckdb-wasm системы управления реляционными базами данных DuckDB, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2025-12833 Уязвимость интерфейса tf.keras.layers.Embedding системы машинного обучения TensorFlow, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации
BDU:2026-00066 Уязвимость пакета changed-files программного обеспечения для автоматизации процессов CI/CD TJ-actions, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2026-00172 Уязвимость библиотеки для синтаксического анализа и генерации строк CSS Color-String, связанная с наличием недекларированных возможностей, позволяющая нарушителю выполнить произвольный код
BDU:2026-00374 Уязвимость npm-библиотеки Debug, связанная с наличием недекларированных возможностей, позволяющая нарушителю выполнить произвольный код

Идентификаторы CVE уязвимостей

Идентификатор, базы данных общеизвестных уязвимостей информационной безопасности
Идентификатор Описание
CVE-2017-16044 `d3.js` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16045 `jquery.js` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16046 `mariadb` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16047 mysqljs was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16048 `node-sqlite` was a malicious module published with the intent to hijack environment variables. It has been unpublished by np...
CVE-2017-16049 `nodesqlite` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm...
CVE-2017-16050 `sqlite.js` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16051 `sqliter` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16052 `node-fabric` was a malicious module published with the intent to hijack environment variables. It has been unpublished by np...
CVE-2017-16053 `fabric-js` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16054 `nodefabric` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm...
CVE-2017-16055 `sqlserver` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16056 mssql.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16057 nodemssql was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16058 gruntcli was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16059 mssql-node was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16060 babelcli was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16061 tkinter was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16062 node-tkinter was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm...
CVE-2017-16063 node-opensl was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16064 node-openssl was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm...
CVE-2017-16065 openssl.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16066 opencv.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16067 node-opencv was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16068 ffmepg was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16069 nodeffmpeg was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16070 nodecaffe was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16071 nodemailer-js was a malicious module published with the intent to hijack environment variables. It has been unpublished by np...
CVE-2017-16072 nodemailer.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by np...
CVE-2017-16073 noderequest was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16074 crossenv was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16075 http-proxy.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by np...
CVE-2017-16076 proxy.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16077 mongose was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16078 shadowsock was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16079 smb was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16080 nodesass was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
CVE-2017-16081 cross-env.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm...
CVE-2017-16128 The module npm-script-demo opened a connection to a command and control server. It has been removed from the npm registry.
CVE-2017-16202 The cofeescript module exfiltrates sensitive data such as a user's private SSH key and bash history to a third party server d...
CVE-2017-16203 The coffe-script module exfiltrates sensitive data such as a user's private SSH key and bash history to a third party server...
CVE-2017-16204 The jquey module exfiltrates sensitive data such as a user's private SSH key and bash history to a third party server during...
CVE-2017-16205 The coffescript module exfiltrates sensitive data such as a user's private SSH key and bash history to a third party server d...
CVE-2017-16207 discordi.js is a malicious module based on the discord.js library that exfiltrates login tokens to pastebin.
CVE-2017-20201 CCleaner v5.33.6162 & CCleaner Cloud v1.07.3191 Malicious Backdoor Supply Chain Compromise
CVE-2017-20202 Web Developer for Chrome v0.4.9 Malicious Backdoor Supply Chain Compromise
CVE-2017-20203 NetSarang v5.0 Malicious Backdoor Supply Chain Compromise
CVE-2018-25117 VestaCP Debian Installer Malicious Backdoor Supply Chain Compromise
CVE-2020-15165 Potentially tampered sources on Play Store for Chameleon Mini Live Debugger
CVE-2021-22887 A vulnerability in the BIOS of Pulse Secure (PSA-Series Hardware) models PSA5000 and PSA7000 could allow an attacker to compr...
CVE-2023-2003 Embedded malicious code vulnerability in Unitronics Vision1210
CVE-2024-3094 Xz: malicious code in distributed source
CVE-2024-4978 Malicious Code in Justice AV Solutions (JAVS) Viewer
CVE-2025-10894 Nx: nx/devkit: malicious versions of nx and plugins published to npm
CVE-2025-30066 tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through...
CVE-2025-30154 Multiple Reviewdog actions were compromised during a specific time period
CVE-2025-32965 Compromised xrpl.js versions 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2
CVE-2025-54313 eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installin...
CVE-2025-59037 DuckDB NPM packages 1.3.3 and 1.29.2 briefly compromised with malware
CVE-2025-59038 Prebid.js NPM package briefly compromised
CVE-2025-59039 Prebid Universal Creative on npm briefly compromised
CVE-2025-59140 backslash@0.2.1 contains malware after npm account takeover
CVE-2025-59141 simple-swizzle@0.2.3 contains malware after npm account takeover
CVE-2025-59142 color-string@2.1.1 contains malware after npm account takeover
CVE-2025-59143 color@5.0.1 contains malware after npm account takeover
CVE-2025-59144 debug@4.4.2 contains malware after npm account takeover
CVE-2025-59145 color-name@2.0.1 contains malware after npm account takeover
CVE-2025-59162 color-convert@3.1.1 contains malware after npm account takeover
CVE-2025-59330 error-ex@1.3.3 contains malware after npm account takeover
CVE-2025-59331 is-arrayish@0.3.3 contains malware after npm account takeover
CVE-2025-59374 "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications...
CVE-2025-8217 Inert Malicious script injected into Amazon Q Developer Visual Studio Code (VS Code) Extension

НКЦКИ уязвимости

Бюллетени НКЦКИ - уязвимости ПО
Идентификатор Дата бюллетеня Описание
VULN:20230605-1 05.06.2023 Выполнение произвольного кода в Gigabyte UEFI firmware
VULN:20240408-9 08.04.2024 Выполнение произвольного кода в XZ Utils
VULN:20240527-17 27.05.2024 Получение конфиденциальной информации в JAVS Viewer
VULN:20241007-54 07.10.2024 Выполнение произвольного кода в mitmproxy pdoc

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.